Why You Need to Master the Basics – A Three Step Campaign

When I was growing up, my father enrolled me in martial arts at an early age. I liked everything about it. I liked the friends I made, I liked the sense of achievement getting the next belt, I liked breaking boards ,but more than anything, I liked to f… Continue reading Why You Need to Master the Basics – A Three Step Campaign

Jumpstarting Your Cyberdefense Machine with CIS Controls V7

Amidst the volatility, uncertainty and noise of the cybersecurity field, few best practice frameworks have emerged as consistently reliable and useful as the Center for Internet Security (CIS) Security Controls. Recently updated as version 7.0, the CIS… Continue reading Jumpstarting Your Cyberdefense Machine with CIS Controls V7

VPNs Aren’t Dead, They Just Need to Evolve

Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people authorized to access the company network. As technology continues to evolve, VPNs have held strong as a tried-and-true … Continue reading VPNs Aren’t Dead, They Just Need to Evolve

20 Critical Security Controls – Control 1: Inventory and Control of Hardware Assets

Today, I will be going over Control 1 from version 7 of the top 20 CIS Controls – Inventory and Control of Hardware Assets. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 1 Start… Continue reading 20 Critical Security Controls – Control 1: Inventory and Control of Hardware Assets

20 CIS Controls – Control 2: Inventory and Control of Software Assets

Today, I will be going over Control 2 from version 7 of the top 20 CIS Controls – Inventory and Control of Software Assets. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 2 Let Cont… Continue reading 20 CIS Controls – Control 2: Inventory and Control of Software Assets

Security Controls: The Key to Ensuring ‘Security in the Cloud’

Organizations face a number of security challenges when migrating to the cloud from on-premise data centers. Their work isn’t done once they’ve completed the move, either. At that stage, enterprises must decide on the best approach to fulfi… Continue reading Security Controls: The Key to Ensuring ‘Security in the Cloud’

20 Critical Security Controls: Control 4 – Controlled Use of Administrative Privileges

Today, I will be going over Control 4 from version 7 of the CIS top 20 Critical Security Controls – Controlled Use of Administrative Privileges. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways… Continue reading 20 Critical Security Controls: Control 4 – Controlled Use of Administrative Privileges

Privacy Breach Exposes 1,200 School Employees’ Partial Social Security Numbers

A privacy breach at a school district in New Jersey exposed portions of 1,200 employees’ Social Security Numbers. The breach occurred at Irvington Public Schools on 16 April when an “unknown source” sent out an email to an undetermine… Continue reading Privacy Breach Exposes 1,200 School Employees’ Partial Social Security Numbers

20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. I will go through the five requirements and… Continue reading 20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the eight requirements and offer my thoughts on what I’ve found. Key … Continue reading 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs